Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Codes, ciphers and spiestales of mil...
~
Dooley, John F.
Codes, ciphers and spiestales of military intelligence in World War I /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Codes, ciphers and spiesby John F. Dooley.
Reminder of title:
tales of military intelligence in World War I /
Author:
Dooley, John F.
Published:
Cham :Springer International Publishing :2016.
Description:
xvii, 280 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
CiphersHistory.
Online resource:
http://dx.doi.org/10.1007/978-3-319-29415-5
ISBN:
9783319294155$q(electronic bk.)
Codes, ciphers and spiestales of military intelligence in World War I /
Dooley, John F.
Codes, ciphers and spies
tales of military intelligence in World War I /[electronic resource] :by John F. Dooley. - Cham :Springer International Publishing :2016. - xvii, 280 p. :ill., digital ;24 cm.
When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly. In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army's Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war. John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.
ISBN: 9783319294155$q(electronic bk.)
Standard No.: 10.1007/978-3-319-29415-5doiSubjects--Personal Names:
742137
Manly, John Matthews,
1865-1940.Subjects--Topical Terms:
742138
Ciphers
--History.
LC Class. No.: D639.C75 / D66 2016
Dewey Class. No.: 940.48673
Codes, ciphers and spiestales of military intelligence in World War I /
LDR
:02906nmm a2200301 a 4500
001
484076
003
DE-He213
005
20160921170715.0
006
m d
007
cr nn 008maaau
008
161012s2016 gw s 0 eng d
020
$a
9783319294155$q(electronic bk.)
020
$a
9783319294148$q(paper)
024
7
$a
10.1007/978-3-319-29415-5
$2
doi
035
$a
978-3-319-29415-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
D639.C75
$b
D66 2016
072
7
$a
PDX
$2
bicssc
072
7
$a
SCI034000
$2
bisacsh
082
0 4
$a
940.48673
$2
23
090
$a
D639.C75
$b
D691 2016
100
1
$a
Dooley, John F.
$3
742136
245
1 0
$a
Codes, ciphers and spies
$h
[electronic resource] :
$b
tales of military intelligence in World War I /
$c
by John F. Dooley.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Copernicus,
$c
2016.
300
$a
xvii, 280 p. :
$b
ill., digital ;
$c
24 cm.
520
$a
When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly. In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army's Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war. John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.
600
1 0
$a
Manly, John Matthews,
$d
1865-1940.
$3
742137
650
0
$a
Ciphers
$x
History.
$3
742138
650
0
$a
Data encryption (Computer science)
$x
History.
$3
742139
650
0
$a
Data structures (Computer science)
$3
183917
650
0
$a
Intelligence service
$z
United States.
$3
197167
650
0
$a
Popular works.
$3
742140
650
0
$a
World War, 1914-1918
$x
Military intelligence
$z
United States.
$3
742141
650
0
$a
World War, 1914-1918
$z
United States
$x
Cryptography.
$3
742142
650
1 4
$a
History.
$3
263737
650
2 4
$a
History of Science.
$3
212526
650
2 4
$a
Data Structures, Cryptology and Information Theory.
$3
273993
650
2 4
$a
Popular Science, general.
$3
273869
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-29415-5
950
$a
History (Springer-41172)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000123866
電子館藏
1圖書
電子書
EB D639.C75 D691 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-29415-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login